BibTeX records: Katsunari Yoshioka

download as .bib file

@article{DBLP:journals/access/UchiboriYO24,
  author       = {Hironori Uchibori and
                  Katsunari Yoshioka and
                  Kazumasa Omote},
  title        = {Honeypot Method to Lure Attackers Without Holding Crypto-Assets},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {16059--16071},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3357785},
  doi          = {10.1109/ACCESS.2024.3357785},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/UchiboriYO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/SasakiKKYM24,
  author       = {Takayuki Sasaki and
                  Mami Kawaguchi and
                  Takuhiro Kumagai and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Observation of Human-Operated Accesses Using Remote Management Device
                  Honeypot},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {107},
  number       = {3},
  pages        = {291--305},
  year         = {2024},
  url          = {https://doi.org/10.1587/transfun.2023cip0018},
  doi          = {10.1587/TRANSFUN.2023CIP0018},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/SasakiKKYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/NakanoCKFYHYM24,
  author       = {Hiroki Nakano and
                  Daiki Chiba and
                  Takashi Koide and
                  Naoki Fukushi and
                  Takeshi Yagi and
                  Takeo Hariu and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Understanding Characteristics of Phishing Reports from Experts and
                  Non-Experts on Twitter},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {107},
  number       = {7},
  pages        = {807--824},
  year         = {2024},
  url          = {https://doi.org/10.1587/transinf.2023edp7221},
  doi          = {10.1587/TRANSINF.2023EDP7221},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/NakanoCKFYHYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YasuiISTYM24,
  author       = {Hiroki Yasui and
                  Takahiro Inoue and
                  Takayuki Sasaki and
                  Rui Tanabe and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {{SPOT:} In-depth Analysis of IoT Ransomware Attacks Using Bare Metal
                  {NAS} Devices},
  journal      = {J. Inf. Process.},
  volume       = {32},
  pages        = {23--34},
  year         = {2024},
  url          = {https://doi.org/10.2197/ipsjjip.32.23},
  doi          = {10.2197/IPSJJIP.32.23},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/YasuiISTYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TanabeIIKIYM24,
  author       = {Rui Tanabe and
                  Yuta Inoue and
                  Daigo Ichikawa and
                  Takahiro Kasama and
                  Daisuke Inoue and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  editor       = {Hossain Shahriar and
                  Hiroyuki Ohsaki and
                  Moushumi Sharmin and
                  Dave Towey and
                  A. K. M. Jahangir Alam Majumder and
                  Yoshiaki Hori and
                  Ji{-}Jiang Yang and
                  Michiharu Takemoto and
                  Nazmus Sakib and
                  Ryohei Banno and
                  Sheikh Iqbal Ahamed},
  title        = {Customized Malware: Identifying Target Systems Using Personally Identifiable
                  Information},
  booktitle    = {48th {IEEE} Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2024, Osaka, Japan, July 2-4, 2024},
  pages        = {1007--1012},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMPSAC61105.2024.00137},
  doi          = {10.1109/COMPSAC61105.2024.00137},
  timestamp    = {Thu, 05 Sep 2024 13:56:33 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/TanabeIIKIYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/TakaoHTTFIGEYM24,
  author       = {Kyohei Takao and
                  Chika Hiraishi and
                  Rui Tanabe and
                  Kazuki Takada and
                  Akira Fujita and
                  Daisuke Inoue and
                  Carlos Ga{\~{n}}{\'{a}}n and
                  Michel van Eeten and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {{VT-SOS:} {A} Cost-effective {URL} Warning utilizing VirusTotal as
                  a Second Opinion Service},
  booktitle    = {{NOMS} 2024 {IEEE} Network Operations and Management Symposium, Seoul,
                  Republic of Korea, May 6-10, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/NOMS59830.2024.10575506},
  doi          = {10.1109/NOMS59830.2024.10575506},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/TakaoHTTFIGEYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SasakiNMSEYM24,
  author       = {Takayuki Sasaki and
                  Takaya Noma and
                  Yudai Morii and
                  Toshiya Shimura and
                  Michel van Eeten and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Who Left the Door Open? Investigating the Causes of Exposed IoT Devices
                  in an Academic Network},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco,
                  CA, USA, May 19-23, 2024},
  pages        = {2291--2309},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SP54263.2024.00117},
  doi          = {10.1109/SP54263.2024.00117},
  timestamp    = {Sat, 21 Sep 2024 14:24:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SasakiNMSEYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/NakaoYSTHTFTMSITITY23,
  author       = {Koji Nakao and
                  Katsunari Yoshioka and
                  Takayuki Sasaki and
                  Rui Tanabe and
                  Xuping Huang and
                  Takeshi Takahashi and
                  Akira Fujita and
                  Jun'ichi Takeuchi and
                  Noboru Murata and
                  Junji Shikata and
                  Kazuki Iwamoto and
                  Kazuki Takada and
                  Yuki Ishida and
                  Masaru Takeuchi and
                  Naoto Yanai},
  title        = {Mitigate: Toward Comprehensive Research and Development for Analyzing
                  and Combating IoT Malware},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {106},
  number       = {9},
  pages        = {1302--1315},
  year         = {2023},
  url          = {https://doi.org/10.1587/transinf.2022ici0001},
  doi          = {10.1587/TRANSINF.2022ICI0001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/NakaoYSTHTFTMSITITY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HuangMFY23,
  author       = {Xuping Huang and
                  Shunsuke Mochizuki and
                  Akira Fujita and
                  Katsunari Yoshioka},
  title        = {Simulating and Estimating the Effectiveness of Security Notification
                  by {ISP} to Malware-Infected Users},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {165--173},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.165},
  doi          = {10.2197/IPSJJIP.31.165},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/HuangMFY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Nakano0KFYHYM23,
  author       = {Hiroki Nakano and
                  Daiki Chiba and
                  Takashi Koide and
                  Naoki Fukushi and
                  Takeshi Yagi and
                  Takeo Hariu and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Canary in Twitter Mine: Collecting Phishing Reports from Experts and
                  Non-experts},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {6:1--6:12},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3600163},
  doi          = {10.1145/3600160.3600163},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Nakano0KFYHYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AnghelVRSMYGZ23,
  author       = {Radu Anghel and
                  Swaathi Vetrivel and
                  Elsa Turcios Rodriguez and
                  Kaichi Sameshima and
                  Daisuke Makita and
                  Katsunari Yoshioka and
                  Carlos Ga{\~{n}}{\'{a}}n and
                  Yury Zhauniarovich},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Peering into the Darkness: The Use of {UTRS} in Combating DDoS Attacks},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_2},
  doi          = {10.1007/978-3-031-51476-0\_2},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AnghelVRSMYGZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isdfs/SasakiYM23,
  author       = {Takayuki Sasaki and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Who are you{\(f\)} OSINT-based Profiling of Infrastructure Honeypot
                  Visitors},
  booktitle    = {11th International Symposium on Digital Forensics and Security, {ISDFS}
                  2023, Chattanooga, TN, USA, May 11-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISDFS58141.2023.10131856},
  doi          = {10.1109/ISDFS58141.2023.10131856},
  timestamp    = {Sun, 04 Jun 2023 12:05:03 +0200},
  biburl       = {https://dblp.org/rec/conf/isdfs/SasakiYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AlsadiSYEG23,
  author       = {Arwa Abdulkarim Al Alsadi and
                  Kaichi Sameshima and
                  Katsunari Yoshioka and
                  Michel van Eeten and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n},
  title        = {Bin there, target that: Analyzing the target selection of IoT vulnerabilities
                  in malware binaries},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {513--526},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607241},
  doi          = {10.1145/3607199.3607241},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AlsadiSYEG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaTKEYM23,
  author       = {Yin Minn Pa Pa and
                  Shunsuke Tanizaki and
                  Tetsui Kou and
                  Michel van Eeten and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing
                  Malware},
  booktitle    = {2023 Cyber Security Experimentation and Test Workshop, {CSET} 2023,
                  Marina del Rey, CA, USA, August 7-8, 2023},
  pages        = {10--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607505.3607513},
  doi          = {10.1145/3607505.3607513},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PaTKEYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-15847,
  author       = {Hiroki Nakano and
                  Daiki Chiba and
                  Takashi Koide and
                  Naoki Fukushi and
                  Takeshi Yagi and
                  Takeo Hariu and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Canary in Twitter Mine: Collecting Phishing Reports from Experts and
                  Non-experts},
  journal      = {CoRR},
  volume       = {abs/2303.15847},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.15847},
  doi          = {10.48550/ARXIV.2303.15847},
  eprinttype    = {arXiv},
  eprint       = {2303.15847},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-15847.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/NakanoCKAYM22,
  author       = {Hiroki Nakano and
                  Daiki Chiba and
                  Takashi Koide and
                  Mitsuaki Akiyama and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Exploring Event-synced Navigation Attacks across User-generated Content
                  Platforms in the Wild},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {372--387},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.372},
  doi          = {10.2197/IPSJJIP.30.372},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/NakanoCKAYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TanabeWFIGEYM22,
  author       = {Rui Tanabe and
                  Tsuyufumi Watanabe and
                  Akira Fujita and
                  Ryoichi Isawa and
                  Carlos Ga{\~{n}}{\'{a}}n and
                  Michel van Eeten and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {577--590},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.577},
  doi          = {10.2197/IPSJJIP.30.577},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/TanabeWFIGEYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HuangMY22,
  author       = {Xuping Huang and
                  Shunsuke Mochizuki and
                  Katsunari Yoshioka},
  title        = {Connection Type Identification and Uplink Speed Estimation of Malware
                  Infected Hosts},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {859--864},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.859},
  doi          = {10.2197/IPSJJIP.30.859},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/HuangMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/UedaSYM22,
  author       = {Takahiro Ueda and
                  Takayuki Sasaki and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive
                  Devices},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {146:1--146:8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3543802},
  doi          = {10.1145/3538969.3543802},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/UedaSYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/AlsadiSBYLEG22,
  author       = {Arwa Abdulkarim Al Alsadi and
                  Kaichi Sameshima and
                  Jakob Bleier and
                  Katsunari Yoshioka and
                  Martina Lindorfer and
                  Michel van Eeten and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware
                  Using Static and Dynamic Analysis},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {309--321},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517408},
  doi          = {10.1145/3488932.3517408},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/AlsadiSBYLEG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YasuiISTYM22,
  author       = {Hiroki Yasui and
                  Takahiro Inoue and
                  Takayuki Sasaki and
                  Rui Tanabe and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {{SPOT:} Analyzing IoT Ransomware Attacks using Bare Metal {NAS} Devices},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {16--23},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00013},
  doi          = {10.1109/ASIAJCIS57030.2022.00013},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YasuiISTYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/Yoshioka22,
  author       = {Katsunari Yoshioka},
  editor       = {Alvaro A. C{\'{a}}rdenas and
                  Daisuke Mashima and
                  Ertem Esiner},
  title        = {Fighting IoT Cyberattacks: Device Discovery, Attack Observation and
                  Security Notification},
  booktitle    = {Proceedings of the 8th {ACM} on Cyber-Physical System Security Workshop,
                  CPSS@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {39--40},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494107.3522781},
  doi          = {10.1145/3494107.3522781},
  timestamp    = {Mon, 04 Jul 2022 17:06:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/Yoshioka22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KondoTSMYM22,
  author       = {Mizuki Kondo and
                  Rui Tanabe and
                  Natsuo Shintani and
                  Daisuke Makita and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  editor       = {Lorenzo Cavallaro and
                  Daniel Gruss and
                  Giancarlo Pellegrino and
                  Giorgio Giacinto},
  title        = {Amplification Chamber: Dissecting the Attack Infrastructure of Memcached
                  DRDoS Attacks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June
                  29 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13358},
  pages        = {178--196},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09484-2\_10},
  doi          = {10.1007/978-3-031-09484-2\_10},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KondoTSMYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangSOYM22,
  author       = {Jia Wang and
                  Takayuki Sasaki and
                  Kazumasa Omote and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding
                  Activities},
  booktitle    = {6th International Conference on Cryptography, Security and Privacy,
                  {CSP} 2022, Tianjin, China, January 14-16, 2022},
  pages        = {71--79},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSP55486.2022.00022},
  doi          = {10.1109/CSP55486.2022.00022},
  timestamp    = {Mon, 06 Nov 2023 13:06:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangSOYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SasakiFGEYM22,
  author       = {Takayuki Sasaki and
                  Akira Fujita and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Michel van Eeten and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure
                  {ICS} Remote Management Devices},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {2379--2396},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833730},
  doi          = {10.1109/SP46214.2022.9833730},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SasakiFGEYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SunBHTYTSQI21,
  author       = {Bo Sun and
                  Tao Ban and
                  Chansu Han and
                  Takeshi Takahashi and
                  Katsunari Yoshioka and
                  Jun'ichi Takeuchi and
                  Abdolhossein Sarrafzadeh and
                  Meikang Qiu and
                  Daisuke Inoue},
  title        = {Leveraging Machine Learning Techniques to Identify Deceptive Decoy
                  Documents Associated With Targeted Email Attacks},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {87962--87971},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3082000},
  doi          = {10.1109/ACCESS.2021.3082000},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SunBHTYTSQI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/KoideCAYM21,
  author       = {Takashi Koide and
                  Daiki Chiba and
                  Mitsuaki Akiyama and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {To Get Lost is to Learn the Way: An Analysis of Multi-Step Social
                  Engineering Attacks on the Web},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {1},
  pages        = {162--181},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020CIP0005},
  doi          = {10.1587/TRANSFUN.2020CIP0005},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/KoideCAYM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KoideCAYM21,
  author       = {Takashi Koide and
                  Daiki Chiba and
                  Mitsuaki Akiyama and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Understanding the Fake Removal Information Advertisement Sites},
  journal      = {J. Inf. Process.},
  volume       = {29},
  pages        = {392--405},
  year         = {2021},
  url          = {https://doi.org/10.2197/ipsjjip.29.392},
  doi          = {10.2197/IPSJJIP.29.392},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/KoideCAYM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Yoshioka21,
  author       = {Katsunari Yoshioka},
  title        = {Editor's Message to Special Issue of Computer Security Technologies
                  for Realizing Society 5.0},
  journal      = {J. Inf. Process.},
  volume       = {29},
  pages        = {504},
  year         = {2021},
  url          = {https://doi.org/10.2197/ipsjjip.29.504},
  doi          = {10.2197/IPSJJIP.29.504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/Yoshioka21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/BokhariIKYM21,
  author       = {Aamir H. Bokhari and
                  Yuta Inoue and
                  Seiya Kato and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Empirical Analysis of Security and Power-Saving Features of Port Knocking
                  Technique Applied to an IoT Device},
  journal      = {J. Inf. Process.},
  volume       = {29},
  pages        = {572--580},
  year         = {2021},
  url          = {https://doi.org/10.2197/ipsjjip.29.572},
  doi          = {10.2197/IPSJJIP.29.572},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/BokhariIKYM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/KatoTYM21,
  author       = {Seiya Kato and
                  Rui Tanabe and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  editor       = {Toufik Ahmed and
                  Olivier Festor and
                  Yacine Ghamri{-}Doudane and
                  Joon{-}Myung Kang and
                  Alberto E. Schaeffer Filho and
                  Abdelkader Lahmadi and
                  Edmundo R. M. Madeira},
  title        = {Adaptive Observation of Emerging Cyber Attacks targeting Various IoT
                  Devices},
  booktitle    = {17th {IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2021, Bordeaux, France, May 17-21, 2021},
  pages        = {143--151},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://ieeexplore.ieee.org/document/9464004},
  timestamp    = {Mon, 05 Jul 2021 08:04:03 +0200},
  biburl       = {https://dblp.org/rec/conf/im/KatoTYM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/TakahashiUHBFNY21,
  author       = {Takeshi Takahashi and
                  Yuki Umemura and
                  Chansu Han and
                  Tao Ban and
                  Keisuke Furumoto and
                  Ohnori Nakamura and
                  Katsunari Yoshioka and
                  Jun'ichi Takeuchi and
                  Noboru Murata and
                  Yoshiaki Shiraishi},
  title        = {Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate
                  Analysis Engines?},
  booktitle    = {19th {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel,
                  Germany, March 22-26, 2021},
  pages        = {376--379},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PerComWorkshops51409.2021.9431125},
  doi          = {10.1109/PERCOMWORKSHOPS51409.2021.9431125},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/TakahashiUHBFNY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WuHYM20,
  author       = {Chun{-}Jung Wu and
                  Shin{-}Ying Huang and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis
                  Using Meta-Feature Information},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {103-B},
  number       = {1},
  pages        = {32--42},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-b\_1\_32},
  doi          = {10.1587/TRANSCOM.2019CPP0009},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WuHYM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetb/SasakiGYEM20,
  author       = {Takayuki Sasaki and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Katsunari Yoshioka and
                  Michel van Eeten and
                  Tsutomu Matsumoto},
  title        = {Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated
                  Attackers},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {103-B},
  number       = {4},
  pages        = {389--404},
  year         = {2020},
  url          = {https://doi.org/10.1587/transcom.2019NRP0001},
  doi          = {10.1587/TRANSCOM.2019NRP0001},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetb/SasakiGYEM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/KaneiCHYMA20,
  author       = {Fumihiro Kanei and
                  Daiki Chiba and
                  Kunio Hato and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Mitsuaki Akiyama},
  title        = {Detecting and Understanding Online Advertising Fraud in the Wild},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {7},
  pages        = {1512--1523},
  year         = {2020},
  url          = {https://doi.org/10.1587/transinf.2019ICP0008},
  doi          = {10.1587/TRANSINF.2019ICP0008},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/KaneiCHYMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/WuYM20,
  author       = {Chun{-}Jung Wu and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {ThingGate: {A} Gateway for Managing Traffic of Bare-metal IoT Honeypot},
  journal      = {J. Inf. Process.},
  volume       = {28},
  pages        = {481--492},
  year         = {2020},
  url          = {https://doi.org/10.2197/ipsjjip.28.481},
  doi          = {10.2197/IPSJJIP.28.481},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/WuYM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TamiyaBENTTFYM20,
  author       = {Kazuki Tamiya and
                  Aamir H. Bokhari and
                  Yuta Ezawa and
                  Sou Nakayama and
                  Ying Tie and
                  Rui Tanabe and
                  Akira Fujita and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Dangers of {IP} Camera - An Observational Study on Peeping},
  journal      = {J. Inf. Process.},
  volume       = {28},
  pages        = {502--510},
  year         = {2020},
  url          = {https://doi.org/10.2197/ipsjjip.28.502},
  doi          = {10.2197/IPSJJIP.28.502},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TamiyaBENTTFYM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TanabeTFIYMGE20,
  author       = {Rui Tanabe and
                  Tatsuya Tamai and
                  Akira Fujita and
                  Ryoichi Isawa and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Carlos Ga{\~{n}}{\'{a}}n and
                  Michel van Eeten},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Disposable botnets: examining the anatomy of IoT botnet infrastructure},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3409177},
  doi          = {10.1145/3407023.3409177},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TanabeTFIYMGE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Koide0AYM20,
  author       = {Takashi Koide and
                  Daiki Chiba and
                  Mitsuaki Akiyama and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  editor       = {Cl{\'{e}}mentine Maurice and
                  Leyla Bilge and
                  Gianluca Stringhini and
                  Nuno Neves},
  title        = {It Never Rains but It Pours: Analyzing and Detecting Fake Removal
                  Information Advertisement Sites},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June
                  24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12223},
  pages        = {171--191},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-52683-2\_9},
  doi          = {10.1007/978-3-030-52683-2\_9},
  timestamp    = {Sun, 25 Jul 2021 11:49:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/Koide0AYM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WanIAYHRD20,
  author       = {Gerry Wan and
                  Liz Izhikevich and
                  David Adrian and
                  Katsunari Yoshioka and
                  Ralph Holz and
                  Christian Rossow and
                  Zakir Durumeric},
  title        = {On the Origin of Scanning: The Impact of Location on Internet-Wide
                  Scans},
  booktitle    = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  October 27-29, 2020},
  pages        = {662--679},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419394.3424214},
  doi          = {10.1145/3419394.3424214},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/WanIAYHRD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TakahashiKVYI20,
  author       = {Takeshi Takahashi and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection:
                  How Do Users Reach Malicious URLs?},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {93--106},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/takahashi},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TakahashiSTY20,
  author       = {Yusuke Takahashi and
                  Shigeyoshi Shima and
                  Rui Tanabe and
                  Katsunari Yoshioka},
  editor       = {Tamara Denning and
                  Tyler Moore},
  title        = {APTGen: An Approach towards Generating Practical Dataset Labelled
                  with Targeted Attack Sequences},
  booktitle    = {13th {USENIX} Workshop on Cyber Security Experimentation and Test,
                  {CSET} 2020, August 10, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/cset20/presentation/takahashi},
  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TakahashiSTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/BanIHYI19,
  author       = {Tao Ban and
                  Ryoichi Isawa and
                  Shin{-}Ying Huang and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  title        = {A Cross-Platform Study on Emerging Malicious Programs Targeting IoT
                  Devices},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {9},
  pages        = {1683--1685},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2018OFL0007},
  doi          = {10.1587/TRANSINF.2018OFL0007},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/BanIHYI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/MorishitaHUTGEY19,
  author       = {Shun Morishita and
                  Takuya Hoizumi and
                  Wataru Ueno and
                  Rui Tanabe and
                  Carlos Ga{\~{n}}{\'{a}}n and
                  Michel van Eeten and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  editor       = {Joe Betser and
                  Carol J. Fung and
                  Alex Clemm and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Shingo Ata},
  title        = {Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing
                  Honeypots},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2019, Washington, DC, USA, April 09-11, 2019},
  pages        = {134--143},
  publisher    = {{IFIP}},
  year         = {2019},
  url          = {http://dl.ifip.org/db/conf/im/im2019/188804.pdf},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/MorishitaHUTGEY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CetinGAKITTYE19,
  author       = {Or{\c{c}}un {\c{C}}etin and
                  Carlos Ga{\~{n}}{\'{a}}n and
                  Lisette Altena and
                  Takahiro Kasama and
                  Daisuke Inoue and
                  Kazuki Tamiya and
                  Ying Tie and
                  Katsunari Yoshioka and
                  Michel van Eeten},
  title        = {Cleaning Up the Internet of Evil Things: Real-World Evidence on {ISP}
                  and Consumer Efforts to Remove Mirai},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/cleaning-up-the-internet-of-evil-things-real-world-evidence-on-isp-and-consumer-efforts-to-remove-mirai/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CetinGAKITTYE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoKTAY18,
  author       = {Hiroki Nakano and
                  Fumihiro Kanei and
                  Yuta Takata and
                  Mitsuaki Akiyama and
                  Katsunari Yoshioka},
  title        = {Towards Finding Code Snippets on a Question and Answer Website Causing
                  Mobile App Vulnerabilities},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {11},
  pages        = {2576--2583},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017ICP0009},
  doi          = {10.1587/TRANSINF.2017ICP0009},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakanoKTAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/WuTHTFYM18,
  author       = {Chun{-}Jung Wu and
                  Ying Tie and
                  Satoshi Hara and
                  Kazuki Tamiya and
                  Akira Fujita and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost
                  Internet-of-Things Devices},
  journal      = {J. Inf. Process.},
  volume       = {26},
  pages        = {662--672},
  year         = {2018},
  url          = {https://doi.org/10.2197/ipsjjip.26.662},
  doi          = {10.2197/IPSJJIP.26.662},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/WuTHTFYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/SasakiYM18,
  author       = {Takayuki Sasaki and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Toward Collaborative Defense Across Organizations},
  journal      = {J. Inf. Process.},
  volume       = {26},
  pages        = {790--803},
  year         = {2018},
  url          = {https://doi.org/10.2197/ipsjjip.26.790},
  doi          = {10.2197/IPSJJIP.26.790},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/SasakiYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/IsawaBTYI18,
  author       = {Ryoichi Isawa and
                  Tao Ban and
                  Ying Tie and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  title        = {Evaluating Disassembly-Code Based Similarity between IoT Malware Samples},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {89--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00023},
  doi          = {10.1109/ASIAJCIS.2018.00023},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/IsawaBTYI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/TanabeUIYMKIR18,
  author       = {Rui Tanabe and
                  Wataru Ueno and
                  Kou Ishii and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Takahiro Kasama and
                  Daisuke Inoue and
                  Christian Rossow},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {Evasive Malware via Identifier Implanting},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {162--184},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_8},
  doi          = {10.1007/978-3-319-93411-2\_8},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/TanabeUIYMKIR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmu/BanIYI18,
  author       = {Tao Ban and
                  Ryoichi Isawa and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  title        = {A Cross-Platform Study on IoT Malware},
  booktitle    = {Eleventh International Conference on Mobile Computing and Ubiquitous
                  Network, {ICMU} 2018, Auckland, New Zealand, October 5-8, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ICMU.2018.8653580},
  doi          = {10.23919/ICMU.2018.8653580},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icmu/BanIYI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/MazurczykKNKHY17,
  author       = {Wojciech Mazurczyk and
                  Maciej Korczynski and
                  Koji Nakao and
                  Engin Kirda and
                  Cristian Hesselman and
                  Katsunari Yoshioka},
  title        = {Traffic Measurements for Cyber Security},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {7},
  pages        = {12--13},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.7981517},
  doi          = {10.1109/MCOM.2017.7981517},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/MazurczykKNKHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/PaSYMKR16,
  author       = {Yin Minn Pa Pa and
                  Shogo Suzuki and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Takahiro Kasama and
                  Christian Rossow},
  title        = {IoTPOT: {A} Novel Honeypot for Revealing Current IoT Threats},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {3},
  pages        = {522--533},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.522},
  doi          = {10.2197/IPSJJIP.24.522},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/PaSYMKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SaitoTYM16,
  author       = {Satomi Saito and
                  Satoru Torii and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Wamber: Defending Web Sites on Hosting Services with Self-Learning
                  Honeypots},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {60--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.32},
  doi          = {10.1109/ASIAJCIS.2016.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SaitoTYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YokoyamaITPYMKI16,
  author       = {Akira Yokoyama and
                  Kou Ishii and
                  Rui Tanabe and
                  Yinmin Papa and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Takahiro Kasama and
                  Daisuke Inoue and
                  Michael Brengel and
                  Michael Backes and
                  Christian Rossow},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence
                  for Sandbox Evasion},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {165--187},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_8},
  doi          = {10.1007/978-3-319-45719-2\_8},
  timestamp    = {Fri, 27 Dec 2019 21:24:31 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YokoyamaITPYMKI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NoroozianKGMYE16,
  author       = {Arman Noroozian and
                  Maciej Korczynski and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Daisuke Makita and
                  Katsunari Yoshioka and
                  Michel van Eeten},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {368--389},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_17},
  doi          = {10.1007/978-3-319-45719-2\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NoroozianKGMYE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KikuchiMNYME16,
  author       = {Yosuke Kikuchi and
                  Hiroshi Mori and
                  Hiroki Nakano and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Michel van Eeten},
  editor       = {Eric Eide and
                  Mathias Payer},
  title        = {Evaluating Malware Mitigation by Android Market Operators},
  booktitle    = {9th Workshop on Cyber Security Experimentation and Test, {CSET} '16,
                  Austin, TX, USA, August 8, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/cset16/workshop-program/presentation/kikuchi},
  timestamp    = {Mon, 01 Feb 2021 08:43:05 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KikuchiMNYME16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2016,
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3},
  doi          = {10.1007/978-3-319-44524-3},
  isbn         = {978-3-319-44523-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/PaYM15,
  author       = {Yin Minn Pa Pa and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Detecting Malicious Domains and Authoritative Name Servers Based on
                  Their Distinct Mappings to {IP} Addresses},
  journal      = {J. Inf. Process.},
  volume       = {23},
  number       = {5},
  pages        = {623--632},
  year         = {2015},
  url          = {https://doi.org/10.2197/ipsjjip.23.623},
  doi          = {10.2197/IPSJJIP.23.623},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/PaYM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SuYSM15,
  author       = {Jiawei Su and
                  Katsunari Yoshioka and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic
                  Measures and Novelty Detection},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {278--293},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_18},
  doi          = {10.1007/978-3-319-30840-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SuYSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KramerKMNKYR15,
  author       = {Lukas Kr{\"{a}}mer and
                  Johannes Krupp and
                  Daisuke Makita and
                  Tomomi Nishizoe and
                  Takashi Koide and
                  Katsunari Yoshioka and
                  Christian Rossow},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {AmpPot: Monitoring and Defending Against Amplification DDoS Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {615--636},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_28},
  doi          = {10.1007/978-3-319-26362-5\_28},
  timestamp    = {Sun, 25 Oct 2020 22:56:09 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KramerKMNKYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/PaSYMKR15,
  author       = {Yin Minn Pa Pa and
                  Shogo Suzuki and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Takahiro Kasama and
                  Christian Rossow},
  editor       = {Aur{\'{e}}lien Francillon and
                  Thomas Ptacek},
  title        = {IoTPOT: Analysing the Rise of IoT Compromises},
  booktitle    = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington,
                  DC, USA, August 10-11, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/woot15/workshop-program/presentation/pa},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/PaSYMKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KasamaYIM13,
  author       = {Takahiro Kasama and
                  Katsunari Yoshioka and
                  Daisuke Inoue and
                  Tsutomu Matsumoto},
  title        = {Catching the Behavioral Differences between Multiple Executions for
                  Malware Detection},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {225--232},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.225},
  doi          = {10.1587/TRANSFUN.E96.A.225},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KasamaYIM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/PaYM13,
  author       = {Yin Minn Pa Pa and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Search Engine Based Investigation on Misconfiguration of Zone Transfer},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {56--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.16},
  doi          = {10.1109/ASIAJCIS.2013.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/PaYM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imt/KasamaYMYEIN12,
  author       = {Takahiro Kasama and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Masaya Yamagata and
                  Masashi Eto and
                  Daisuke Inoue and
                  Koji Nakao},
  title        = {Malware Sandbox Analysis with Efficient Observation of Herder's Behavior},
  journal      = {Inf. Media Technol.},
  volume       = {7},
  number       = {4},
  pages        = {1577--1587},
  year         = {2012},
  url          = {https://doi.org/10.11185/imt.7.1577},
  doi          = {10.11185/IMT.7.1577},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imt/KasamaYMYEIN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KasamaYMYEIN12,
  author       = {Takahiro Kasama and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Masaya Yamagata and
                  Masashi Eto and
                  Daisuke Inoue and
                  Koji Nakao},
  title        = {Malware Sandbox Analysis with Efficient Observation of Herder's Behavior},
  journal      = {J. Inf. Process.},
  volume       = {20},
  number       = {4},
  pages        = {835--845},
  year         = {2012},
  url          = {https://doi.org/10.2197/ipsjjip.20.835},
  doi          = {10.2197/IPSJJIP.20.835},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/KasamaYMYEIN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/KasamaYIM12,
  author       = {Takahiro Kasama and
                  Katsunari Yoshioka and
                  Daisuke Inoue and
                  Tsutomu Matsumoto},
  title        = {Malware Detection Method by Catching Their Random Behavior in Multiple
                  Executions},
  booktitle    = {12th {IEEE/IPSJ} International Symposium on Applications and the Internet,
                  {SAINT} 2012, Izmir, Turkey, July 16-20, 2012},
  pages        = {262--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SAINT.2012.49},
  doi          = {10.1109/SAINT.2012.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/KasamaYIM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/FujiiYSM12,
  author       = {Takayoshi Fujii and
                  Katsunari Yoshioka and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  title        = {An Efficient Dynamic Detection Method for Various x86 Shellcodes},
  booktitle    = {12th {IEEE/IPSJ} International Symposium on Applications and the Internet,
                  {SAINT} 2012, Izmir, Turkey, July 16-20, 2012},
  pages        = {284--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SAINT.2012.52},
  doi          = {10.1109/SAINT.2012.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/FujiiYSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/MatsumotoHTYO12,
  author       = {Tsutomu Matsumoto and
                  Masato Hata and
                  Masato Tanabe and
                  Katsunari Yoshioka and
                  Kazuomi Oishi},
  title        = {A Method of Preventing Unauthorized Data Transmission in Controller
                  Area Network},
  booktitle    = {Proceedings of the 75th {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2012, Yokohama, Japan, May 6-9, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/VETECS.2012.6240294},
  doi          = {10.1109/VETECS.2012.6240294},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/MatsumotoHTYO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimOYISESMN11,
  author       = {Hyung Chan Kim and
                  Tatsunori Orii and
                  Katsunari Yoshioka and
                  Daisuke Inoue and
                  Jungsuk Song and
                  Masashi Eto and
                  Junji Shikata and
                  Tsutomu Matsumoto and
                  Koji Nakao},
  title        = {An Empirical Evaluation of an Unpacking Method Implemented with Dynamic
                  Binary Instrumentation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {94-D},
  number       = {9},
  pages        = {1778--1791},
  year         = {2011},
  url          = {https://doi.org/10.1587/transinf.E94.D.1778},
  doi          = {10.1587/TRANSINF.E94.D.1778},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimOYISESMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imt/YoshiokaHOM11,
  author       = {Katsunari Yoshioka and
                  Yoshihiko Hosobuchi and
                  Tatsunori Orii and
                  Tsutomu Matsumoto},
  title        = {Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware
                  Analysis Systems},
  journal      = {Inf. Media Technol.},
  volume       = {6},
  number       = {2},
  pages        = {633--648},
  year         = {2011},
  url          = {https://doi.org/10.11185/imt.6.633},
  doi          = {10.11185/IMT.6.633},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imt/YoshiokaHOM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YoshiokaHOM11,
  author       = {Katsunari Yoshioka and
                  Yoshihiko Hosobuchi and
                  Tatsunori Orii and
                  Tsutomu Matsumoto},
  title        = {Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware
                  Analysis Systems},
  journal      = {J. Inf. Process.},
  volume       = {19},
  pages        = {153--168},
  year         = {2011},
  url          = {https://doi.org/10.2197/ipsjjip.19.153},
  doi          = {10.2197/IPSJJIP.19.153},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/YoshiokaHOM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoshiokaM10,
  author       = {Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {210--218},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.210},
  doi          = {10.1587/TRANSFUN.E93.A.210},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoshiokaM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/EtoSIYN10,
  author       = {Masashi Eto and
                  Kotaro Sonoda and
                  Daisuke Inoue and
                  Katsunari Yoshioka and
                  Koji Nakao},
  title        = {Fine-Grain Feature Extraction from Malware's Scan Behavior Based on
                  Spectrum Analysis},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {5},
  pages        = {1106--1116},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.1106},
  doi          = {10.1587/TRANSINF.E93.D.1106},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/EtoSIYN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/YoshiokaHOM10,
  author       = {Katsunari Yoshioka and
                  Yoshihiko Hosobuchi and
                  Tatsunori Orii and
                  Tsutomu Matsumoto},
  title        = {Vulnerability in Public Malware Sandbox Analysis Systems},
  booktitle    = {Tenth Annual International Symposium on Applications and the Internet,
                  {SAINT} 2010, Seoul, Korea, 19-23 July, 2010, Proceedings},
  pages        = {265--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SAINT.2010.16},
  doi          = {10.1109/SAINT.2010.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/YoshiokaHOM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakaoIEY09,
  author       = {Koji Nakao and
                  Daisuke Inoue and
                  Masashi Eto and
                  Katsunari Yoshioka},
  title        = {Practical Correlation Analysis between Scan and Malware Profiles against
                  Zero-Day Attacks Based on Darknet Monitoring},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {5},
  pages        = {787--798},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.787},
  doi          = {10.1587/TRANSINF.E92.D.787},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakaoIEY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/InoueYEHN09,
  author       = {Daisuke Inoue and
                  Katsunari Yoshioka and
                  Masashi Eto and
                  Yuji Hoshizawa and
                  Koji Nakao},
  title        = {Automated Malware Analysis System and Its Sandbox for Revealing Malware's
                  Internal and External Activities},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {5},
  pages        = {945--954},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.945},
  doi          = {10.1587/TRANSINF.E92.D.945},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/InoueYEHN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoshiokaIEHNN09,
  author       = {Katsunari Yoshioka and
                  Daisuke Inoue and
                  Masashi Eto and
                  Yuji Hoshizawa and
                  Hiroki Nogawa and
                  Koji Nakao},
  title        = {Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {5},
  pages        = {955--966},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.955},
  doi          = {10.1587/TRANSINF.E92.D.955},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoshiokaIEHNN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/EtoSIYN09,
  author       = {Masashi Eto and
                  Kotaro Sonoda and
                  Daisuke Inoue and
                  Katsunari Yoshioka and
                  Koji Nakao},
  editor       = {Chi{-}Sing Leung and
                  Minho Lee and
                  Jonathan Hoyin Chan},
  title        = {A Proposal of Malware Distinction Method Based on Scan Patterns Using
                  Spectrum Analysis},
  booktitle    = {Neural Information Processing, 16th International Conference, {ICONIP}
                  2009, Bangkok, Thailand, December 1-5, 2009, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5864},
  pages        = {565--572},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10684-2\_63},
  doi          = {10.1007/978-3-642-10684-2\_63},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/EtoSIYN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/InoueSEYN09,
  author       = {Daisuke Inoue and
                  Mio Suzuki and
                  Masashi Eto and
                  Katsunari Yoshioka and
                  Koji Nakao},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {{DAEDALUS:} Novel Application of Large-Scale Darknet Monitoring for
                  Practical Protection of Live Networks},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {381--382},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_33},
  doi          = {10.1007/978-3-642-04342-0\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/InoueSEYN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdim/YoshiokaSTM08,
  author       = {Katsunari Yoshioka and
                  Kotaro Sonoda and
                  Osamu Takizawa and
                  Tsutomu Matsumoto},
  title        = {Information Hiding on Lossless Data Compression},
  journal      = {J. Digit. Inf. Manag.},
  volume       = {6},
  number       = {2},
  pages        = {151--160},
  year         = {2008},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdim/YoshiokaSTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/InoueYEHN08,
  author       = {Daisuke Inoue and
                  Katsunari Yoshioka and
                  Masashi Eto and
                  Yuji Hoshizawa and
                  Koji Nakao},
  title        = {Malware Behavior Analysis in Isolated Miniature Network for Revealing
                  Malware's Network Activity},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages        = {1715--1721},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICC.2008.330},
  doi          = {10.1109/ICC.2008.330},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/InoueYEHN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/InoueYEYNTON09,
  author       = {Daisuke Inoue and
                  Katsunari Yoshioka and
                  Masashi Eto and
                  Masaya Yamagata and
                  Eisuke Nishino and
                  Jun'ichi Takeuchi and
                  Kazuya Ohkouchi and
                  Koji Nakao},
  editor       = {Mario K{\"{o}}ppen and
                  Nikola K. Kasabov and
                  George G. Coghill},
  title        = {An Incident Analysis System {NICTER} and Its Analysis Engines Based
                  on Data Mining Techniques},
  booktitle    = {Advances in Neuro-Information Processing, 15th International Conference,
                  {ICONIP} 2008, Auckland, New Zealand, November 25-28, 2008, Revised
                  Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5506},
  pages        = {579--586},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-02490-0\_71},
  doi          = {10.1007/978-3-642-02490-0\_71},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/InoueYEYNTON09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/YoshiokaM08,
  author       = {Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Fingerprinting Traffic Log},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {143--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.276},
  doi          = {10.1109/IIH-MSP.2008.276},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/YoshiokaM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/SonodaYT07,
  author       = {Kotaro Sonoda and
                  Katsunari Yoshioka and
                  Osamu Takizawa},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {Information Hiding for Public Address Audio Signal using {FH/FSK}
                  Spread-spectrum Scheme},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {279--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIHMSP.2007.4457705},
  doi          = {10.1109/IIHMSP.2007.4457705},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/SonodaYT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/YoshiokaSTM06,
  author       = {Katsunari Yoshioka and
                  Kotaro Sonoda and
                  Osamu Takizawa and
                  Tsutomu Matsumoto},
  title        = {Information Hiding on Lossless Data Compression},
  booktitle    = {Second International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California,
                  USA, December 18-20, 2006, Proceedings},
  pages        = {15--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IIH-MSP.2006.265109},
  doi          = {10.1109/IIH-MSP.2006.265109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/YoshiokaSTM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoshiokaSM05,
  author       = {Katsunari Yoshioka and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  title        = {On Collusion Security of Random Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {296--304},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_296\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoshiokaSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/YoshiokaM03,
  author       = {Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Random-Error Resilience of a Short Collusion-Secure Code},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {5},
  pages        = {1147--1155},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_5\_1147},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/YoshiokaM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YoshiokaSM03,
  author       = {Katsunari Yoshioka and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Systematic Treatment of Collusion Secure Codes: Security Definitions
                  and Their Relations},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {408--421},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_31},
  doi          = {10.1007/10958513\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YoshiokaSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}